[COMPLETE] Guide To Avoid Chargebacks

Discussion in 'Guides' started by Lean, Mar 13, 2013.

[COMPLETE] Guide To Avoid Chargebacks
  1. Unread #1 - Mar 13, 2013 at 4:52 PM
  2. Lean
    Joined:
    Feb 22, 2012
    Posts:
    4,696
    Referrals:
    1
    Sythe Gold:
    99
    Detective Trole Pool Shark Le Kingdoms Player Member of the Month Winner

    Lean Grand Master
    leanbean901 Donor Retired Global Moderator

    [COMPLETE] Guide To Avoid Chargebacks

    I'm not sure if there is already a guide for this out there, but i have noticed that many people on sythe attempt "unauthorized chargebacks" With the use of a vpn, after seeing a $300 total loss due to this type of chargebacks within one day on sunday, my partner and i have decided to conduct hours and hours upon research and brainstorming on all ways possible to prevent this major issue from happening. We have found many things relating to this topic and would like to share them with you all, as i'm sure this happens to more than half of you. By the way, credit for all this info to google search, and others.





    1 - Didn't Receive my Item



    Simply put, a chargeback is when Paypal reverses a transaction. The most common reason for a chargeback is that the buyer never received the good. However, Paypal has a policy that it does not offer chargebacks for virtual items, because there is no actual way of proving if it was sent or not. The note included in a selling line, "This is payment for virtual goods which I have received," is always good at assuring PayPal realizes this. Honestly, people have a really hard time accepting any payment except for gifts because gifts cannot be claimed using this type of chargeback, but we shouldn't be worrying about this type at all on Sythe. I've won a fair deal of disputes just by saying that I was selling a virtual item.







    2 - Unauthorized Transaction


    This is the WORST type of chargeback. If this type of chargeback comes up, you are nearly defenseless. Nothing you can say will be of much help. This chargeback is technically supposed to prevent stolen PayPal accounts, but on Sythe 99% of the unauthorized claims are faked. This happens by a person using a Virtual Private Network to fake their IP address, and they claim from their normal IP that it was stolen. Yes, this is incredibly illegal, but doesn't stop scammers from attempting it.

    Just because you are defenseless against this once it is claimed doesn't mean you can't prevent it. There are many clues to tell if a person will commit an unauthorized transaction fraud. Firstly, if they are offering to pay an absurd amount, it's almost surely a scam. Secondly, if they immediately say "I'll go first" or seem to know more about Sythe than a Newcommer should, it's almost surely a scam. Thirdly, anything else suspicious can clue you off: look at their address on PayPal (if they sent Payment for Goods). If it says Massachusetts and they have broken English, it's probably not really true. Even the most vigilant can still get scammed by this, so limit your transactions on PayPal very low. Almost every single high-ball offer for PayPal only is a scam.






    3 - Limited PayPal


    If a buyer's person gets limited, then most of his transactions will be refunded to him. There's nothing to do to avoid this except trading with verified PayPal members who trade safely. Read the next section for how to avoid getting limited.







    PayPal Limitations


    PayPal will limit an account that it decides violates their terms or is abusing some sort of power. On Sythe, a lot of limitations have been popping up, and for two reasons. Firstly, if you're under 18 and cannot verify your PayPal with a bank account, it is almost certainly going to be limited in the future. This limitation is easy to fix if you're 18+, as you can just send them a scan of your drivers license. If you're less than 18, you'll need your parents to contact them and convince them to put you on a student account. In any case, post on the forums if your account is limited and people with experience will be able to help your individual case.







    The second reason for limitations is abusing PayPal charge features--namely gifts.
    Explanation of why PayPal hates gifts.


    These are an interesting phenomenon on Sythe, and I honestly don't understand why it's such a big deal. People think gifts are the only secure way of PayPal, but 90% of chargebacks are because an unauthorized claim anyway.Gifts do not reduce your risk of an unauthorized account chargeback! They also don't help much in a "did-not-receive" claim because virtual goods are not covered in PayPal's buyer protection policies. So, always use the appropriate payment type for what you are selling. If you're skilling, make them pay Payment for Services. If you're selling goods, make them pay Payment for Goods. It's always good to take screenshots of your trades as evidence, but really all you need to prove is that the person paid for virtual items and you'll win the claim.


    If your PayPal is limited because you abused gift payments, you're in a much deeper pit. Some of the highest traders on Sythe have been limited because of this, and I still see many of them limited to this day. You have to verify with them extensively that you own your account, etc. etc. etc. Definitely post on the forums for help, as these limitations do need to dealt with on a case-by-case basis.






    Now to better understand what a VPN is



    A virtual private network (VPN) extends a private network and the resources contained in the network across public networks like the Internet. It enables a host computer to send and receive data across shared or public networks as if it were a private network with all the functionality, security and management policies of the private network.

    This is done by establishing a virtual point-to-point connection through the use of dedicated connections, encryption, or a combination of the two.
    The VPN connection across the Internet is technically a wide area network (WAN) link between the sites but appears to the user as a private network link—hence the name "virtual private network".


    Early data networks allowed VPN-style remote connectivity through dial-up modems or through leased line connections utilizing Frame Relay and Asynchronous Transfer Mode (ATM) virtual circuits provisioned through a network owned and operated by telecommunication carriers such as AT&T or Verizon. These networks are not considered true VPNs because they passively secure the data being transmitted by the creation of logical data streams. They have given way to VPNs based on IP and IP/Multiprotocol Label Switching Networks (MPLS) based VPNs due to significant cost-reductions and increased bandwidth provided by new technologies such as Digital Subscriber Line (DSL)and fiber-optic networks.
    VPNs can be either remote-access (connecting an individual computer to a network) or site-to-site (connecting two networks together). In a corporate setting, remote-access VPNs allow employees to access their company's intranet from home or while traveling outside the office, and site-to-site VPNs allow employees in geographically separated offices to share one cohesive virtual network. A VPN can also be used to interconnect two similar networks over a dissimilar middle network; for example, two IPv6 networks over an IPv4 network.
    VPN systems can be classified by:
    the protocols used to tunnel the traffic
    the tunnel's termination point, i.e., customer edge or network-provider edge
    whether they offer site-to-site or remote-access connectivity
    the levels of security provided
    the OSI layer they present to the connecting network, such as Layer 2 circuits or Layer 3 network connectivity






    Example use of a VPN Tunnel


    The following steps illustrate the principles of a VPN client-server interaction in simple terms.
    Assume a remote host with public IP address 1.2.3.4 wishes to connect to a server found inside a company network. The server has internal address 192.168.1.10 and is not reachable publicly. Before the client can reach this server, it needs to go through a VPN server / firewall device that has public IP address 5.6.7.8 and an internal address of 192.168.1.1. All data between the client and the server will need to be kept confidential, hence a secure VPN is used.
    The VPN client connects to a VPN server via an external network interface.
    The VPN server assigns an IP address to the VPN client from the VPN server's subnet. The client gets internal IP address 192.168.1.50, for example, and creates a virtual network interface through which it will send encrypted packets to the other tunnel endpoint (the device at the other end of the tunnel).(This interface also gets the address 192.168.1.50.)
    When the VPN client wishes to communicate with the company server, it prepares a packet addressed to 192.168.1.10, encrypts it and encapsulates it in an outer VPN packet, say an IPSec packet. This packet is then sent to the VPN server at IP address 5.6.7.8 over the public Internet. The inner packet is encrypted so that even if someone intercepts the packet over the Internet, they cannot get any information from it. They can see that the remote host is communicating with a server/firewall, but none of the contents of the communication. The inner encrypted packet has source address 192.168.1.50 and destination address 192.168.1.10. The outer packet has source address 1.2.3.4 and destination address 5.6.7.8.
    When the packet reaches the VPN server from the Internet, the VPN server decapsulates the inner packet, decrypts it, finds the destination address to be 192.168.1.10, and forwards it to the intended server at 192.168.1.10.
    After some time, the VPN server receives a reply packet from 192.168.1.10, intended for 192.168.1.50. The VPN server consults its routing table, and sees this packet is intended for a remote host that must go through VPN.
    The VPN server encrypts this reply packet, encapsulates it in a VPN packet and sends it out over the Internet. The inner encrypted packet has source address 192.168.1.10 and destination address 192.168.1.50. The outer VPN packet has source address 5.6.7.8 and destination address 1.2.3.4.
    The remote host receives the packet. The VPN client decapsulates the inner packet, decrypts it, and passes it to the appropriate software at upper layers.
    Overall, it is as if the remote computer and company server are on the same 192.168.1.0/24 network.



    Tunneling protocols can operate in a point-to-point network topology that would theoretically not be considered a VPN, because a VPN by definition is expected to support arbitrary and changing sets of network nodes. But since most router implementations support a software-defined tunnel interface, customer-provisioned VPNs often are simply defined tunnels running conventional routing protocols.






    OSI Layer 2 services


    Virtual LAN
    A Layer 2 technique that allows for the coexistence of multiple LAN broadcast domains, interconnected via trunks using the IEEE 802.1Q trunking protocol. Other trunking protocols have been used but have become obsolete, including Inter-Switch Link (ISL), IEEE 802.10 (originally a security protocol but a subset was introduced for trunking), and ATM LAN Emulation (LANE).
    Virtual private LAN service (VPLS)
    Developed by IEEE, VLANs allow multiple tagged LANs to share common trunking. VLANs frequently comprise only customer-owned facilities. Whereas VPLS as described in the above section (OSI Layer 1 services) supports emulation of both point-to-point and point-to-multipoint topologies, the method discussed here extends Layer 2 technologies such as 802.1d and 802.1q LAN trunking to run over transports such as Metro Ethernet.
    As used in this context, a VPLS is a Layer 2 PPVPN, rather than a private line, emulating the full functionality of a traditional local area network (LAN). From a user standpoint, a VPLS makes it possible to interconnect several LAN segments over a packet-switched, or optical, provider core; a core transparent to the user, making the remote LAN segments behave as one single LAN.[16]
    In a VPLS, the provider network emulates a learning bridge, which optionally may include VLAN service.
    Pseudo wire (PW)
    PW is similar to VPWS, but it can provide different L2 protocols at both ends. Typically, its interface is a WAN protocol such as Asynchronous Transfer Mode or Frame Relay. In contrast, when aiming to provide the appearance of a LAN contiguous between two or more locations, the Virtual Private LAN service or IPLS would be appropriate.
    IP-only LAN-like service (IPLS)
    A subset of VPLS, the CE devices must have L3 capabilities; the IPLS presents packets rather than frames. It may support IPv4 or IPv6.
    [edit]OSI Layer 3 PPVPN architectures
    This section discusses the main architectures for PPVPNs, one where the PE disambiguates duplicate addresses in a single routing instance, and the other, virtual router, in which the PE contains a virtual router instance per VPN. The former approach, and its variants, have gained the most attention.
    One of the challenges of PPVPNs involves different customers using the same address space, especially the IPv4 private address space.[17] The provider must be able to disambiguate overlapping addresses in the multiple customers' PPVPNs.
    BGP/MPLS PPVPN
    In the method defined by RFC 2547, BGP extensions advertise routes in the IPv4 VPN address family, which are of the form of 12-byte strings, beginning with an 8-byte Route Distinguisher (RD) and ending with a 4-byte IPv4 address. RDs disambiguate otherwise duplicate addresses in the same PE.
    PEs understand the topology of each VPN, which are interconnected with MPLS tunnels, either directly or via P routers. In MPLS terminology, the P routers are Label Switch Routers without awareness of VPNs.
    Virtual router PPVPN
    The Virtual Router architecture, as opposed to BGP/MPLS techniques, requires no modification to existing routing protocols such as BGP. By the provisioning of logically independent routing domains, the customer operating a VPN is completely responsible for the address space. In the various MPLS tunnels, the different PPVPNs are disambiguated by their label, but do not need routing distinguishers.






    Plaintext tunnels


    Main article: Tunneling protocol
    Some virtual networks may not use encryption to protect the data contents. While VPNs often provide security, an unencrypted overlay network does not neatly fit within the secure or trusted categorization. For example a tunnel set up between two hosts that used Generic Routing Encapsulation (GRE) would in fact be a virtual private network, but neither secure nor trusted.
    Besides the GRE example above, native plaintext tunneling protocols include Layer 2 Tunneling Protocol (L2TP) when it is set up without IPsec and Point-to-Point Tunneling Protocol (PPTP) or Microsoft Point-to-Point Encryption (MPPE).



    hoping this guide has helped some of you in avoiding money losses due to chargebacks.
     
  3. Unread #2 - Mar 13, 2013 at 5:07 PM
  4. R
    Joined:
    Apr 4, 2011
    Posts:
    19,571
    Referrals:
    16
    Sythe Gold:
    572
    In Memory of Jon <3 n4n0 Sythe Awards 2013 Winner

    R Legend
    Retired Administrator Roary Donor Mudkips Legendary

    [COMPLETE] Guide To Avoid Chargebacks

    Seems legit, nice one :)

    I'd recommend making the headings more noticeable, e.g. bigger/different colour etc. just to make it a bit more reader friendly.

    Otherwise, #winning
     
  5. Unread #3 - Mar 13, 2013 at 8:03 PM
  6. GamerRoach
    Joined:
    Dec 10, 2012
    Posts:
    224
    Referrals:
    0
    Sythe Gold:
    0

    GamerRoach Active Member
    Banned

    [COMPLETE] Guide To Avoid Chargebacks

    Awesome Guide :D
     
  7. Unread #4 - Mar 13, 2013 at 10:42 PM
  8. Heads447
    Joined:
    Jan 19, 2012
    Posts:
    4,895
    Referrals:
    2
    Sythe Gold:
    669

    Heads447 R.I.P in peace

    [COMPLETE] Guide To Avoid Chargebacks

    like others have said, very well-written guide!
     
  9. Unread #5 - Mar 14, 2013 at 6:20 PM
  10. Lean
    Joined:
    Feb 22, 2012
    Posts:
    4,696
    Referrals:
    1
    Sythe Gold:
    99
    Detective Trole Pool Shark Le Kingdoms Player Member of the Month Winner

    Lean Grand Master
    leanbean901 Donor Retired Global Moderator

    [COMPLETE] Guide To Avoid Chargebacks

    Thanks for the feedback! I hope this guide helps other users prevent chargebacks aswell.
     
  11. Unread #6 - Mar 15, 2013 at 8:50 AM
  12. Savitar
    Joined:
    Feb 27, 2013
    Posts:
    233
    Referrals:
    0
    Sythe Gold:
    0

    Savitar Active Member
    Banned

    [COMPLETE] Guide To Avoid Chargebacks

  13. Unread #7 - Mar 15, 2013 at 9:09 AM
  14. Lean
    Joined:
    Feb 22, 2012
    Posts:
    4,696
    Referrals:
    1
    Sythe Gold:
    99
    Detective Trole Pool Shark Le Kingdoms Player Member of the Month Winner

    Lean Grand Master
    leanbean901 Donor Retired Global Moderator

    [COMPLETE] Guide To Avoid Chargebacks

    Maybe you should read before posting. Sources are listed. Thanks anyway though.. enjoy your stay on sythe
     
  15. Unread #8 - Mar 15, 2013 at 9:46 AM
  16. Savitar
    Joined:
    Feb 27, 2013
    Posts:
    233
    Referrals:
    0
    Sythe Gold:
    0

    Savitar Active Member
    Banned

    [COMPLETE] Guide To Avoid Chargebacks

    I meant detailed sources like Wikipedia, not some random "google search" , but whatever.
     
  17. Unread #9 - Mar 15, 2013 at 12:05 PM
  18. Lean
    Joined:
    Feb 22, 2012
    Posts:
    4,696
    Referrals:
    1
    Sythe Gold:
    99
    Detective Trole Pool Shark Le Kingdoms Player Member of the Month Winner

    Lean Grand Master
    leanbean901 Donor Retired Global Moderator

    [COMPLETE] Guide To Avoid Chargebacks

    As far as I'm concerned no detailed source is needed and neither is your spam. This is a guide not a cert. "google search and others" is fine enough to explain where i have found my info, mainly the "examples of VPN uses" and "google search" is not some random thing, Thanks anyway for the attempt, if you don't like the guide, then dont use it. Also the part your referring to is the least relevant part of the guide and is meant for more of an example of What a vpn use looks like as appose to an actual part of the guide, as well it does not consume half of the guide. So not quite sure what the point of your posts are. Thanks, i hope this guide has also helped you as well.
     
  19. Unread #10 - Mar 15, 2013 at 6:11 PM
  20. TheSoto
    Joined:
    Mar 15, 2013
    Posts:
    27
    Referrals:
    0
    Sythe Gold:
    10
    Two Factor Authentication User

    TheSoto Member

    [COMPLETE] Guide To Avoid Chargebacks

    Saved, looks like this would actually work. Def with the unauthorized payment which is a bitch.
     
  21. Unread #11 - Mar 18, 2013 at 2:07 AM
  22. KerokeroCola
    Joined:
    Aug 1, 2010
    Posts:
    8,268
    Referrals:
    12
    Sythe Gold:
    14

    KerokeroCola Hero
    Retired Global Moderator KerokeroCola Donor

    [COMPLETE] Guide To Avoid Chargebacks

    http://www.sythe.org/market-discussion/1056701-paypal-chargebacks-limitations.html

    ...................................the fuck bro? If you are going to straight up copy and paste, at least give credit where credit is due.


    Where? In your massive wall of ill-formatted text, I see no accreditation, acknowledgment, or any mention of anyone else's work at all except for Google. By the way, Google is a search engine, and unless you use their own published documents, they don't deserve credit for it. You need to credit the people who spent the time to write the text you stole.

    For that matter, I doubt anybody would consider your "effort" here anywhere near enough for this to not be plagiarism outright. All you added to these copy+paste walls is the first and last lines of some introduction and conclusions. Either add more of your own conclusions or just request a mod to lock this plagiarism thread.



    Although I can obviously relate to your attempt at trying to better the community (and I do commend the effort), you need to do so with respect to the original authors of the work. It's a matter of decency, and to be frank, I'm pretty disappointed that my own hours of work has been summed up as "Google search and others."
     
  23. Unread #12 - Mar 18, 2013 at 9:52 PM
  24. KerokeroCola
    Joined:
    Aug 1, 2010
    Posts:
    8,268
    Referrals:
    12
    Sythe Gold:
    14

    KerokeroCola Hero
    Retired Global Moderator KerokeroCola Donor

    [COMPLETE] Guide To Avoid Chargebacks

    Clearly 2buymore is a Chinese site that stole my guide--the guide that I did, in fact, write. At any rate, again, I said I can commend your effort to help the people of Sythe, but you are required to do so in a more original way.
     
  25. Unread #13 - Mar 19, 2013 at 7:30 AM
  26. Breazzy
    Joined:
    Mar 9, 2013
    Posts:
    32
    Referrals:
    0
    Sythe Gold:
    0

    Breazzy Member
    Banned

    [COMPLETE] Guide To Avoid Chargebacks

    Good guide.
     
  27. Unread #14 - Mar 21, 2013 at 6:07 AM
  28. Heads447
    Joined:
    Jan 19, 2012
    Posts:
    4,895
    Referrals:
    2
    Sythe Gold:
    669

    Heads447 R.I.P in peace

    [COMPLETE] Guide To Avoid Chargebacks

    Now that I think about, Kero is right. You have good intentions, no doubt about that, but this is plagiarism plain and simple. Also, giving credit to "google search and others" isn't at all citing your sources. Also,
    This makes it seem like you want to take the credit for doing this, even though you basically C&P'd information from various sites and didn't actually write up any of this yourself. I'd suggest going back and citing each paragraph where you got the information from and re-word the OP a bit. Don't be a Nerfed v2...
     
  29. Unread #15 - Mar 25, 2013 at 5:19 PM
  30. BlackbrookMatt
    Joined:
    Feb 27, 2010
    Posts:
    111
    Referrals:
    0
    Sythe Gold:
    0

    BlackbrookMatt Active Member
    Banned

    [COMPLETE] Guide To Avoid Chargebacks

    Great guide thanks
     
  31. Unread #16 - Mar 25, 2013 at 5:20 PM
  32. BlackbrookMatt
    Joined:
    Feb 27, 2010
    Posts:
    111
    Referrals:
    0
    Sythe Gold:
    0

    BlackbrookMatt Active Member
    Banned

    [COMPLETE] Guide To Avoid Chargebacks

    Will be using this guide in the future
     
  33. Unread #17 - Apr 4, 2013 at 3:01 PM
  34. D00MR4ZR
    Joined:
    May 6, 2010
    Posts:
    125
    Referrals:
    0
    Sythe Gold:
    0

    D00MR4ZR Active Member

    [COMPLETE] Guide To Avoid Chargebacks

    Very nice guide and thanks for the effort, but in summary this is nothing new nor revolutionary.
     
  35. Unread #18 - Apr 28, 2013 at 12:01 AM
  36. Elena
    Joined:
    Dec 29, 2012
    Posts:
    2,215
    Referrals:
    1
    Sythe Gold:
    5

    Elena Now Processing Donations Via RSGP :)
    Banned

    [COMPLETE] Guide To Avoid Chargebacks

    Nice guide, I also like the effort you put into it to make it appealing to the eye :)
     
  37. Unread #19 - Apr 28, 2013 at 9:50 AM
  38. Moes
    Joined:
    Sep 22, 2012
    Posts:
    3,872
    Referrals:
    9
    Sythe Gold:
    4
    Vouch Thread:
    Click Here
    Heidy Le Kingdoms Player <3 n4n0 Le Monkey In Memory of Jon Green eggs and spam Extreme Homosex MushyMuncher Potamus (2)
    Gohan has AIDS Lumpy Space Princess Pokémon Trainer Wait, do you not have an Archer rank?

    Moes Software engineer
    Retired Global Moderator You Shall Not Pass Dot Net Programmer

    [COMPLETE] Guide To Avoid Chargebacks

    nice guide, however knowledge of VPN is not required to prevent chargebacks...
     
  39. Unread #20 - Apr 29, 2013 at 6:09 AM
  40. I_DONT_BOT
    Joined:
    Sep 30, 2009
    Posts:
    9,548
    Referrals:
    25
    Sythe Gold:
    2
    Tier 1 Prizebox

    I_DONT_BOT Free MMing & Sythe Help - PM me
    I_DONT_BOT Donor

    [COMPLETE] Guide To Avoid Chargebacks

    It's a good thread, but the title's a bit deceiving, people may think that using a VPN will make them immune, you can always be chargedback unfortunately, they just need to do an unauthorized claim.
     
< How to Mod Sleeping Dogs! | can i use VPS (dedicated ip) for payapl ?? >

Users viewing this thread
1 guest


 
 
Adblock breaks this site